Go to primary content
Oracle® Retail Merchandising Cloud Services Administration Guide
Release 16.0.027
E96476-02
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

3 Data Security/Filtering

Data Security/Filtering Implementation

If Data Level Security is enabled in Merchandising, then for the users to have access to the data, the below must be setup through the Data Upload Utility available in Merchandising. This is used both in the core Merchandising solution, as well as Allocation, Invoice Match, Pricing, and Sales Audit.

  • Security Groups

  • Security User and Security User Role

  • Security User and Security Group mapping information

  • Merchandise Hierarchy LOV filtering access information

  • Purchase Order Approval Limits

Setup Security Groups

Perform the following procedure to define a Security Group in the system.

  1. Navigate to Foundation Data > Data Loading > Download.

  2. In the Download Data screen, select Template Type as 'Security' and Template as 'Security Groups'.

    Figure 3-1 Download Security Groups Template Spreadsheet

    Surrounding text describes Figure 3-1 .
  3. Click the Download button.

  4. Save File to a local directory location when prompted.

    Figure 3-2 Save File

    Surrounding text describes Figure 3-2 .
  5. Click the Done button.

  6. Open the downloaded file.

    Figure 3-3 Open File

    Surrounding text describes Figure 3-3 .
  7. Save As < file name>.

    Figure 3-4 Save as <File Name>

    Surrounding text describes Figure 3-4 .
  8. In the Security_Groups tab, enter/select the following:

    • Action: 'Create'

    • Group ID: <Group ID>

    • Group Name: <Group Name>

    • Business Role: <role> (optional)

    • Comments: <comments> (optional)

  9. In the Security_Groups_Translations tab, enter the translated Security Group descriptions (optional).

    Figure 3-5 Enter Security Groups information

    Surrounding text describes Figure 3-5 .
  10. Save and Close the file.

  11. In the RMS Application, navigate to Foundation Data > Data Loading > Upload.

  12. In the Upload Data screen, select:

    • Template Type as 'Security'

    • Template as 'Security Groups'

    • Enter new Process Description or retain as is

    • Browse and select the Source file that was created in Step 10

    Figure 3-6 Upload Security Groups Information

    Surrounding text describes Figure 3-6 .
  13. Click the Upload button.

    Figure 3-7 Upload Security Group Information Complete

    Surrounding text describes Figure 3-7 .
  14. Click the Done button.

  15. View the newly created Security Group by downloading the Security Groups spreadsheet (Steps 1 - 6).

    Figure 3-8 View newly created Security Group

    Surrounding text describes Figure 3-8 .

    Note:

    The system generated Group ID. This Group ID should be mapped to the Security Users.

Setup Security User and Security User Role

The Application (LDAP) User ID used to login to the RMS application must be defined as a Security User.

  1. Navigate to Foundation Data > Data Loading > Download.

  2. In the Download Data screen, select Template Type as 'Security' and Template as 'Security Users'.

    Figure 3-9 Download Security Users template spreadsheet

    Surrounding text describes Figure 3-9 .
  3. Click the Download button.

  4. Save File to local directory location when prompted.

    Figure 3-10 Save File

    Surrounding text describes Figure 3-10 .
  5. Click the Done button.

  6. Open the downloaded file.

    Figure 3-11 Open File

    Surrounding text describes Figure 3-11 .
  7. Save As < file name>.

    Figure 3-12 Save as <File Name>

    Surrounding text describes Figure 3-12 .
  8. In the Security_Users tab, enter/select the following:

    • Action: 'Create'

    • User Sequence: <number>

    • Application User ID: <Application User ID>

    • RMS User Ind: Yes

    • ReSA User Ind: Yes/No

    • ReIM User Ind: Yes/No

    • Allocation User Ind: Yes/No

    Figure 3-13 Security Users Information

    Surrounding text describes Figure 3-13 .
  9. In the Security_User_Roles tab, enter/select the following:


    Note:

    Proceed to set up Security User Role, only if Role Privileges have been setup.

    • Action: 'Create'

    • User Sequence: <number>


      Note:

      This must be the User Sequence provided in the Security_Users tab.

    • Role: <Role>

    Figure 3-14 Security User Roles Information

    Surrounding text describes Figure 3-14 .
  10. Save and Close the file.

  11. In the RMS Application, navigate to Foundation Data > Data Loading > Upload.

  12. In the Upload Data screen, select:

    • Template Type as 'Security'

    • Template as 'Security Users'

    • Enter Process Description or retain as is

    • Browse and select the Source file that was created in Step 10

    Figure 3-15 Upload Security Users Information

    Surrounding text describes Figure 3-15 .
  13. Click the Upload button.

    Figure 3-16 Upload Security Users Information Complete

    Surrounding text describes Figure 3-16 .
  14. Click the Done button.

  15. View the newly created Security User and Security User Role by downloading the Security Users spreadsheet (Steps 1 - 6).

    Figure 3-17 View newly created Security User and Security Role Mapping information

    Surrounding text describes Figure 3-17 .

    Figure 3-18 View newly created Security User Role mapping information

    Surrounding text describes Figure 3-18 .

    Note the system generated User Sequence. This Security User (User Sequence) will be mapped to the Security Group.

Map Security User to Security Group

The security user must be assigned to a security group. This is achieved by associating the User Sequence assigned to the Application User ID with a Security User Group.

  1. Navigate to Foundation Data > Data Loading > Download.

  2. In the Download Data screen, select Template Type as 'Security' and Template as 'Associate Users to Groups'.

    Figure 3-19 Download Associate User to Groups Template Spreadsheet

    Surrounding text describes Figure 3-19 .
  3. Click the Download button.

  4. Save the file to a local directory location when prompted.

    Figure 3-20 Save File

    Surrounding text describes Figure 3-20 .
  5. Click the Done button.

  6. Open the downloaded file.

    Figure 3-21 Open File

    Surrounding text describes Figure 3-21 .
  7. Save As < file name>.

    Figure 3-22 Save as <File Name>

    Surrounding text describes Figure 3-22 .
  8. In the User_Groups tab, enter/select the following:

    • Action: 'Create'

    • Group ID: <Group ID>

    • User ID: <User ID>

    Figure 3-23 Enter User Groups information

    Surrounding text describes Figure 3-23 .
  9. Save and Close the file.

  10. In the RMS Application, navigate to Foundation Data > Data Loading > Upload.

  11. In the Upload Data screen, select:

    • Template Type as 'Security'

    • Template as 'Associate Users to Groups'

    • Enter new Process Description or retain as is

    • Browse and select the Source file that was created in Step 9

    Figure 3-24 Upload User Groups Information

    Surrounding text describes Figure 3-24 .
  12. Click the Upload button.

    Figure 3-25 Upload User Groups Information Complete

    Surrounding text describes Figure 3-25 .
  13. Click the Done button.

  14. View the newly created User Groups mapping by downloading the User Groups spreadsheet (Steps 1 - 6).

    Figure 3-26 View Newly Created User Group Association

    Surrounding text describes Figure 3-26 .

Assign Groups to Hierarchies

The security group can only access the merchandise hierarchies and organization hierarchies assigned to the user through Filter Groups. If a security group is not assigned to any Filter Group then the users in the group are considered 'super users' and will have access to all merchandise hierarchies or all organization hierarchies respectively.

  1. Navigate to Foundation Data > Data Loading > Download.

  2. In the Download Data screen, select Template Type as 'Security' and Template as 'Filter Groups'.

    Figure 3-27 Download Filter Groups Template Spreadsheet

    Surrounding text describes Figure 3-27 .
  3. Click the Download button.

  4. Save File to local directory location when prompted.

    Figure 3-28 Save File

    Surrounding text describes Figure 3-28 .
  5. Click the Done button.

  6. Open the downloaded file.

    Figure 3-29 Open File

    Surrounding text describes Figure 3-29 .
  7. Save As < file name>.

    Figure 3-30 Save as <File Name>

    Surrounding text describes Figure 3-30 .
  8. In the Filter_Group_Organization tab, enter/select the following:

    • Action: 'Create'

    • Sec Group ID: <User Security group ID>

    • Filter Org Level: <Organization hierarchy level>

    • Filter Org ID: <ID of the Organization hierarchy level>

    Figure 3-31 Enter Filter Group Organization information

    Surrounding text describes Figure 3-31 .
  9. In the Filter_Group_Merchandise tab, enter/select the following:

    • Action: 'Create'

    • Sec Group ID: <User Security group ID>

    • Filter Merch Level: <Organization hierarchy level>

    • Filter Merch ID: <ID of the Merchandise hierarchy level>

    • Filter Merch ID Class: <Class ID of the Merchandise hierarchy level> (optional depending on the selected Filter Merch Level)

    • Filter Merch ID Subclass: <Subclass ID of the Merchandise hierarchy level> (optional depending on the selected Filter Merch Level)

    Figure 3-32 Enter Filter Group Merchandise information

    Surrounding text describes Figure 3-32 .
  10. Save and close the file.

  11. In the RMS Application, navigate to Foundation Data > Data Loading > Upload.

  12. In the Upload Data screen, select:

    • Template Type as 'Security'

    • Template as 'Filter Groups'

    • Enter new Process Description or retain as is

    • Browse and select the Source file that was created in Step 10

    Figure 3-33 Upload Filter Groups Information

    Surrounding text describes Figure 3-33 .
  13. Click the Upload button.

    Figure 3-34 Upload Filter Groups Information Complete

    Surrounding text describes Figure 3-34 .
  14. Click the Done button.

  15. View the newly created Filter Groups mapping by downloading the Filter Groups spreadsheet (Steps 1 - 6).

    Figure 3-35 View Newly Created Filter Groups

    Surrounding text describes Figure 3-35 .

    Figure 3-36 Newly Created Filter Groups

    Surrounding text describes Figure 3-36 .

Setup Purchase Order Approval Limits

The setup of role privileges can be used to manage the size of a purchase order that a user can approve. The basis of this is either cost or retail based on the system option configuration. This setup is not required if user roles will not have an approval limit.

  1. Log into the RMS Application.

  2. Navigate to Foundation Data > Data Loading > Download.

  3. In the Download Data screen, select:

    • Template Type as 'Security'

    • Template as 'Role Privileges'

    Figure 3-37 Download Security Privileges Template Spreadsheet

    Download Security Privileges Template Spreadsheet
  4. Click the Download button.

  5. Save File to the local directory location when prompted.

    Figure 3-38 Save File

    Save File Dialog
  6. Click the Done button.

  7. Open the downloaded file.

    Figure 3-39 Open File

    Open File
  8. Save As < file name>.

    Figure 3-40 Save as <File Name>

    Save as <File Name>
  9. In the Role_Privileges tab, enter/select the following:

    • Action: 'Create'

    • Role: <Role>

    • Order Approve Amt: < Upper limit that the role will be able to approve on an order>

    Figure 3-41 Enter Role Privileges Information

    Enter Role Privileges information
  10. Save and Close the file.

  11. In the RMS Application, navigate to Foundation Data > Data Loading > Upload.

  12. In the Upload Data screen, select:

    • Template Type as 'Security'

    • Template as 'Role Privileges'

    • Enter new Process Description or retain as is

    • Browse and select the Source file that was created in Step 10

    Figure 3-42 Upload Role Privileges Information

    Upload Role Privileges Information
  13. Click the Upload button.

    Figure 3-43 Upload Role Privileges Information Complete

    Upload Role Privileges Information Complete
  14. Click the Done button.

  15. View the newly created Role Privileges by downloading the Role privileges spreadsheet (Steps 2 - 7).

    Figure 3-44 View Newly Created Role Privilege

    View Newly Created Role Privilege